Virtual Private Network


Definition of a VPN:

VPN - A method employing encryption to provide secure access to a remote computer over the Internet.

To further answer the question, it would be best to review the definition of a VPN from difference sources so as to conclude a universal definition for a Virtual Private Network.

VPN is virtual private network that uses a public connection, such as Internet, to provide remote offices or employees/users with secure connection to organization’s network.
(http://www.cisco.com/application/pdf/paws/14106/how_vpn_works.pdf)

It is a private network the uses public network to connect remote sites or users together.
(http://computer.howstuffworks.com/vpn.htm)

It is the connection of multiple networks that use public lines to create a private network on the Internet. Furthermore, the data sent between these networks through the VPN's data are encrypted and therefore cannot be intercepted if tried. Lastly, it also only allows authorized users to access the network.
(http://en.wikipedia.org/wiki/Virtual_private_network)

In conclusion, a VPN is Network that is created on the Internet that connects multiple networks together into a private network on the Internet only accessible by authorized users and ensures that the transfer of data cannot be intercepted.

How do Virtual Private Networks work?


Overview:
VPNs work by first being set-up, this is done with multiple networks connected together in one private network created on the Internet. This private network will need to be set-up by one of the networks or users before the other networks are able to connect to it. In this phase, the user will add the modifications and specifications needed for their Virtual Private Network as well as add security measures to the VPN to ensure it is private for only these networks to access. Once the VPN is created, says someone requests for data from another network. They use the VPN to access this data, the data when being transferred via the VPN will be encrypted and undetectable/cannot be intercepted by normal security such as Firewalls. This will ensure the data reaches the client that requests it. In addition to the already present security the VPN provides, only authorized users are allow to access this VPN and the network connections it has, which means some authorization has to be done before the user is allowed to use the VPN, making it a much safer network and a more convenient means of communicating.

Transfer of Data:
VPN technology is based on VPN tunneling which establishes and maintains the network connection. When a packet is constructed through the connection, packets in a specific VPN protocol format are changed or summarized into a different type of base or protocol where it is sent and decoded on the receiving side.
In internet-based VPNS, the packets are coded in Internet Protocol (IP) packets while VPN protocol is authenticated and encrypted to keep the network secure.
2 types of tunneling
1. Voluntary (2 steps)
a. VPN client manages connection setup
b. Client creates connection to carrier network provider and creates the VPN tunnel in a server for other connections.
c. 2 steps
i.
2. Compulsory (1 step)
a. Carrier network provider manages the tunnel
b. Authenticates and encrypts clients using VPN server
c. VPN server also hides detail of the server
(http://compnetworking.about.com/od/vpn/a/vpn_tunneling.htm)

What are the applications/use of this technology?

Arts, Entertainment, and Leisure:
Examples:
- Ability to access certain sites that were previously inaccessible (i.e. Facebook/Youtube in China)
- Ability to communicate and interact with other users in the same private network.

Business and Employment:
Examples:
- Setting up a main network that all officers of that company can connect to.
- Ease of accessing company information if connected through another network.


Education:
Examples:
- Ability to access certain sites that were previously inaccessible for Educational Purposes
- Can be used as a means for students to open school resources at home without having to be in the School Network.

What are the Advantages of a VPN?

VPNs vs leased lines
Organizations need to rent network capacity such as T1 lines to achieve full, secured connectedness between their different locations. With a VPN, you use public network infrastructure including the Internet to make these connections and tap into that virtual network through much cheaper local leased lines or even just broadband connections to a nearby Internet Service Provider (ISP).

Long distance phone charges
A VPN can replace remote access servers and long-distance dial-up network connections commonly used in the past by business travelers needing to access to their company intranet. For example, with an Internet VPN, clients need only connect to the nearest service provider's access point that is usually local.

Support costs
With VPNs, the cost of maintaining servers is less because organizations can outsource the needed support from professional third-party service providers. These providers can provide a much lower cost structure through economy of scale by servicing many business clients.

VPN Network Scalability
The cost of building a dedicated private network may be reasonable at first but increases exponentially as the organization grows. A company with two branch offices, for example, can deploy just one dedicated line to connect the two locations, but 4 branch offices require 6 lines to directly connect them to each other, 6 branch offices need 15 lines, and so on. Internet based VPNs avoid this scalability problem by simply tapping into the public lines and network capability readily available. Particularly for remote and international locations, an Internet VPN offers superior reach and quality of service.

(http://compnetworking.about.com/od/vpn/f/vpn_benefits.htm)

Other Advantages:
- Ability to conceal real IP Address to prevent IP Tracking and keep you anonymous online
- Can be used to establish long-distance and secured network connections
- A VPN is a very secured network due to the many procedures it takes to only allow authorized users in as well as encryption of data being transferred so as to prevent any of it from being intercepted.
- Ability to access sites that are blocked by a firewall in a network
- Ease of access for users that can connect to the Network despite being in different locations.

Business and Employment Advantages:
- Increase sales, product development
- Strategic partnership strengthen

What are the Disadvantages of a VPN?

Lack of Security
VPN message traffic is carried on public networking infrastructure e.g. the Internet, or over a service provider's network, which mean - circulating corporate data —one of your most valuable assets—on the line. Even though there are many methods and technologies available to ensure data protection (like encryption implementation), the level of concern about Internet security is quite high and data on transmission is vulnerable to hackers. The uses of VPNs at this moment still require an in-depth understanding of public network security issues.

Less Bandwidth than Dedicated Line
Every use of Internet system consumes bandwidth; the more users there are, the less bandwidth there is for any single user. Some VPN service providers offer guaranteed bandwidth, and private networks can be built with guaranteed bandwidth allocations, however, these options will increase the cost of the system.

(http://www.vpn-info.com/disadvantages_of_vpn.htm)

Other Disadvantages:
- Private Information could be stored on the VPN unwillingly or not knowingly, which allows those in control of the VPN to access them
- VPN does not check files that are being transferred, instead just encrypts these files. (Which could lead to having viruses in the file)

Possible Social and Ethical Issues that arise from the use of VPNs:

Social and Ethical Issues that arise from VPNs:

Reliability - The reliability of a VPN, especially when there is no connection to the Internet. Just how reliable is the extent of a VPN in any given situation?

Security - Though a VPN's security may seem very secure from its basic definition and understanding, its security can yet still be questioned. Does the VPN do enough encryption when data is transferred to be easily intercepted, or are there any unauthorized users who can secretly enter the VPN and access all of these Network’s information.

Privacy and Anonymity – Is the Anonymity a VPN provides considered total anonymity? Can a VPN uphold the value of privacy on the network? Does a VPN give the user Privacy while surfing the Internet?

Authenticity – Is the information accessed on the VPN come from the user? Could the data be transacted during the transfer? Does a VPN alter files on a network?

Control - Who is in control of a VPN Network? Who has more power in a VPN Network? Will this control cause problems with the other users/networks?

Policies and Standards – Are Policies and Standards of a Work Company/School/etc. ensured in a VPN? Would there be a new set of Policies and Standards for the VPN?

Links/Bibliography:
http://www.webopedia.com/TERM/V/VPN.html
http://www.querycat.com/question/126557b4058ffb796380e9ded0e9cebb
http://helpdesk.scothosts.com/index.php?_m=knowledgebase&_a=viewarticle&kbarticleid=99
http://www.howstuffworks.com/vpn.htm
http://compnetworking.about.com/od/vpn/f/vpn_benefits.htm
http://www.alliancedatacom.com/why-use-vpn.asp